frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

FSF announces Librephone project

https://www.fsf.org/news/librephone-project
219•g-b-r•2h ago•68 comments

Beliefs that are true for regular software but false when applied to AI

https://boydkane.com/essays/boss
215•beyarkay•7h ago•179 comments

How bad can a $2.97 ADC be?

https://excamera.substack.com/p/how-bad-can-a-297-adc-be
192•jamesbowman•8h ago•98 comments

Hacking the Humane AI Pin

https://writings.agg.im/posts/hacking_ai_pin/
62•agg23•6d ago•13 comments

How AI hears accents: An audible visualization of accent clusters

https://accent-explorer.boldvoice.com/
160•ilyausorov•9h ago•64 comments

Unpacking Cloudflare Workers CPU Performance Benchmarks

https://blog.cloudflare.com/unpacking-cloudflare-workers-cpu-performance-benchmarks/
100•makepanic•5h ago•14 comments

Surveillance data challenges what we thought we knew about location tracking

https://www.lighthousereports.com/investigation/surveillance-secrets/
296•_tk_•5h ago•70 comments

SmolBSD – build your own minimal BSD system

https://smolbsd.org
126•birdculture•8h ago•9 comments

Meditating with mongooses: Backyard wildlife phtotography lessons

https://wildgundmi.com/meditating-with-mongooses
6•mylittlefinger•1h ago•0 comments

What Americans die from vs. what the news reports on

https://ourworldindata.org/does-the-news-reflect-what-we-die-from
388•alphabetatango•7h ago•216 comments

How to turn liquid glass into a solid interface

https://tidbits.com/2025/10/09/how-to-turn-liquid-glass-into-a-solid-interface/
71•tambourine_man•6h ago•52 comments

Interior cancels largest solar project in North America

https://www.politico.com/news/2025/10/10/trump-interior-department-cancels-largest-solar-project-...
58•pseudolus•2h ago•39 comments

A 12,000-year-old obelisk with a human face was found in Karahan Tepe

https://www.trthaber.com/foto-galeri/karahantepede-12-bin-yil-oncesine-ait-insan-yuzlu-dikili-tas...
238•fatihpense•1w ago•97 comments

GrapheneOS is ready to break free from Pixels

https://www.androidauthority.com/graphene-os-major-android-oem-partnership-3606853/
153•MaximilianEmel•3h ago•74 comments

Astronomers 'image' a mysterious dark object in the distant Universe

https://www.mpg.de/25518363/1007-asph-astronomers-image-a-mysterious-dark-object-in-the-distant-u...
190•b2ccb2•11h ago•101 comments

ADS-B Exposed

https://adsb.exposed/
277•keepamovin•15h ago•72 comments

AppLovin nonconsensual installs

https://www.benedelman.org/applovin-nonconsensual-installs/
128•jhap•5h ago•44 comments

Show HN: An open source access logs analytics script to block bot attacks

https://github.com/tempesta-tech/webshield
20•krizhanovsky•6h ago•2 comments

AI and Home-Cooked Software

https://mrkaran.dev/posts/ai-home-cooked-software/
31•todsacerdoti•1w ago•19 comments

Beating the L1 cache with value speculation (2021)

https://mazzo.li/posts/value-speculation.html
3•shoo•4d ago•1 comments

Show HN: Metorial (YC F25) – Vercel for MCP

https://github.com/metorial/metorial
43•tobihrbr•10h ago•15 comments

Zoo of array languages

https://ktye.github.io/
145•mpweiher•14h ago•44 comments

Beyond the SQLite single-writer limitation with concurrent writes

https://turso.tech/blog/beyond-the-single-writer-limitation-with-tursos-concurrent-writes
53•syrusakbary•1w ago•49 comments

Preparing for AI's economic impact: exploring policy responses

https://www.anthropic.com/research/economic-policy-responses
17•grantpitt•6h ago•11 comments

CSS for Styling a Markdown Post

https://webdev.bryanhogan.com/miscellaneous/styling-markdown/
8•bryanhogan•1w ago•3 comments

Show HN: Wispbit - Linter for AI coding agents

https://wispbit.com
23•dearilos•5h ago•10 comments

Prefix sum: 20 GB/s (2.6x baseline)

https://github.com/ashtonsix/perf-portfolio/tree/main/delta
74•ashtonsix•8h ago•28 comments

Why Is SQLite Coded In C

https://www.sqlite.org/whyc.html
120•plainOldText•5h ago•115 comments

Testing a compiler-driven full-stack web framework

https://wasp.sh/blog/2025/10/07/how-we-test-a-web-framework
43•franjo_mindek•6d ago•9 comments

Transverse Mercator with an accuracy of a few nanometers (2010)

https://arxiv.org/abs/1002.1417
3•nill0•1d ago•1 comments
Open in hackernews

Surveillance data challenges what we thought we knew about location tracking

https://www.lighthousereports.com/investigation/surveillance-secrets/
295•_tk_•5h ago

Comments

aucisson_masque•4h ago
I didn't quite understand how they are capable of tracking people and breaking WhatsApp encryption.

There is mention of fake antenna but I don't think they cover entire country with that, how do they do?

jonplackett•4h ago
Yes - and they also claim not to track users themselves. Is that just a lie or is there someone else doing the tracking?

This article answers none of my questions!

kipchak•4h ago
There's more details in the technical explainer linked in the article.

https://www.lighthousereports.com/methodology/surveillance-s...

CGMthrowaway•4h ago
They use vulns in the outdated SS7 system to trick networks into revealing a numbers location (1), and intercept SMS including the verification codes sent by apps like WhatsApp - allowing them to hijack accounts and monitor messages and calls directly (2). This method works remotely and doesn’t require antennas

The SMS are intercepted because thru SS7 by tricking the network into thinking the target phone is roaming (3).

(1)https://www.lighthousereports.com/methodology/surveillance-s...

(2)https://www.motherjones.com/politics/2025/10/firstwap-altami...

(3)https://www.fyno.io/blog/is-it-easy-to-intercept-sms-a-compl...

arkadiyt•4h ago
> intercept SMS including the verification codes sent by apps like WhatsApp

For anyone worried, this approach:

1) Breaks the existing phone from receiving WhatsApp messages, so you can notice that behavior

2) Can be prevented by setting up a WhatsApp pin in your settings

citizenpaul•4h ago
Not just vulns. It is possible to simply purchase access or become a provider in the SS7 system (<$20-50k USD). SMS is basically a completely open system at this point. Cybersecurity companies do it all the time for pentesting. So do "Cybersecurity companies".

Horrifying that nearly banks still require you to use sms as a 2fa and do not offer any other alternative.

Did you really think the US Gov was OK with facebook running the biggest "encrypted" SMS system on earth. LOL of course they already had access to all the messages.

varenc•3h ago
Hijacking WhatsApp SMS authentication codes can be prevented by just adding a PIN to your account. Doing this attack also doesn't grant you access to someone's old WhatsApp messages, and contacts with "security notices" enabled will see that your device has changed. It's quite different than big gov just having access to all your WhatsApp messages. (But there might be other ways they can do this, but just SMS sniffing doesn't get you there)
bayindirh•3h ago
> Horrifying that nearly banks still require you to use sms as a 2fa and do not offer any other alternative.

In my country banking applications are tied to your phone via IMEI, SIM and other hardware dependent information available.

Forget getting banking details and use another device without the user knowing, either.

If someone clones your SIM or gets a replacement in behalf of you, your all banking access is blocked until you enable them one by one with your ID card or other means.

One of the banks can use FaceID as a secondary factor, too.

So, other methods are possible. It's an "implementation detail" at this point.

simultsop•4h ago
And then they call people paranoid to go off the grid.
dylan604•4h ago
That's what they do to the people that figure things out. They discredit them so other people will not listen to them. It's the ones that go full tilt with lining the walls of their houses to be Faraday cages that make it all fringy cringy the rationally paranoid folks get lumped in with.
physarum_salad•4h ago
Well its always funny to observe politicians/other VIPs use similar technologies to the most "loopy" prepper when they need to. Like actual faraday/signal jamming tents during negotiations or similar.
lawlessone•3h ago
tbf, when the UK introduced a text to notify people of missing children ,some people(including relatives) were complaining on facebook that it could be used by the UK government to track everyone.

As if their government couldn't just track the smartphone or them via social media already.

dylan604•2h ago
The cognitive dissonance of thinking that apps are needed to track someone with a phone vs just being able to track your phone directly is very telling. Even before smart phones with apps, the tracking was there as a required feature to make mobile work. Granted, the number of people that spend any cycles thinking about how mobile signals work probably rounds to 0. It takes someone really dialed in to the details to come up interesting bolt on things to an existing system like tracking people with a mobile device just by looking at the logs. Same thing with looking at "just the metadata". While it may be obvious to those dialed in, to those oblivious it sounds crazy.
baxtr•4h ago
For anyone interested, they also have a technical explainer that describes their methodology in detail.

https://www.lighthousereports.com/methodology/surveillance-s...

janwillemb•4h ago
It is about a company, First Wap, that makes it possible to track individuals. Their USP is a piece of software that operates at phone network level and uses the fact that phone companies still support an old protocol, Signalling System 7:

> Phone networks need to know where users are in order to route text messages and phone calls. Operators exchange signalling messages to request, and respond with, user location information. The existence of these signalling messages is not in itself a vulnerability. The issue is rather that networks process commands, such as location requests, from other networks, without being able to verify who is actually sending them and for what purpose.

> These signalling messages are never seen on a user’s phone. They are sent and received by “Global Titles” (GTs), phone numbers that represent nodes in a network but are not assigned to subscribers.

beached_whale•3h ago
I assumed it was the telecoms just selling the data about their subscribers. https://www.telecomstechnews.com/news/fcc-fines-major-telcos...
pkulak•1h ago
Why not both?
beached_whale•1h ago
One would hope the selling is illegal and did more than just fine the companies.
overfeed•2h ago
> The issue is rather that networks process commands, such as location requests, from other networks, without being able to verify who is actually sending them and for what purpose

'Fun' fact: "other networks" includes all foreign networks with a roaming partnership. It's possible to abuse SS7 to track people across borders, from half the world away.

foolfoolz•33m ago
it’s more than that. it’s any device that can present itself as a possible base station. this is how trumps lawyer was caught in a place he claimed to not be: https://www.reuters.com/article/world/special-counsel-has-ev...

this also helped confirm the identity of the 2022 killer in idaho https://en.wikipedia.org/wiki/2022_University_of_Idaho_murde...

Tenemo•4h ago
> We found Netflix producer Adam Ciralsky, Blackwater founder Erik Prince, Nobel Peace Prize nominee Benny Wenda, Austropop star Wolfgang Ambros, Tel Aviv district prosecutor Liat Ben Ari and Ali Nur Yasin, a senior editor at our Indonesian partner Tempo.

Political figures being there I somewhat understand, but a Netflix producer? Why would anyone need to track a Netflix producer?

kipchak•4h ago
Maybe hoping to bump into them for a impromptu elevator pitch for a show?
gnatman•4h ago
Looking at his career and production credits, it’s probably more accurate to describe him as a journalist who’s covered some sensitive subjects.
layer8•4h ago
He’s also a journalist and had a carrier at the CIA. Why don’t you look him up if you’re curious about that?
kjs3•4h ago
They're a critic?
attila-lendvai•3h ago
look up Operation Mockingbird. half of the media is government operatives...

netflix is a crucial tool of narrative control...

they are nowhere near "just producers"...

trinsic2•3h ago
This is why I think Microsoft, Apple and Google are owned as well. And answers a lot of questions about gatekeeping and vendor lock-in
nostrademons•4h ago
It's fascinating how these secrets are turning up in the press now. The article is (probably intentionally) vague about it's sources: they only say "Lighthouse found a vast archive of data on the deep web". But reading between the lines - does that imply that this surveillance company kept records on thousands of targets, and then left them in an open S3 bucket? Not the first time - the TM_Signal leak of upper-echelon U.S. government communications was also facilitated by an open S3 bucket that contained the message archives of everything that, say, the Secretary of Defense was messaging to the POTUS.

But it is highly ironic that these companies specialize in surveillance, tracking, and security, and then have a tendency to leave the data that they steal from others open to the Internet in a very amateurish security lapse that in turn leads to everyone stealing from them.

dylan604•3h ago
Is it possible the phreakers are so specialized they have no experience with cloud admin and just went with some copypasta from SO answers to get the boring shit done so they could get back to phreaking? Not everyone is an expert in cloud management. It is easy to bork something when you have no idea what you're doing because you don't want to be doing it. They could have also hired low level people to do something for them and just didn't spend enough to have it done correctly. There's many reasons for a very specialized group of smart people to do something utterly dumb and easy to avoid by people with other specialized skills. These people would probably look at you as silly and amateur for using SMS.
walterbell•3h ago
"Why the US still won’t require SS7 fixes that could secure your phone" (2019) https://arstechnica.com/features/2019/04/fully-compromised-c...

  the group:

    - dragged its feet on resolving SS7 security vulnerabilities 
    - repeatedly ignored input from DHS technical experts
    - [identified] best practices.. using different filtering systems
    - [but] pushed.. to rely on voluntary compliance
daxfohl•3h ago
Did I miss something? This was not surprising. I figured all this would have been possible (and commonplace) decades ago. I was expecting this to be about government eyes and ears in my toilet or something.
Lapsa•3h ago
mind reading technology is here, an actual reality
lschueller•3h ago
Another brilliant example, why we need good (cooperating, international) journalism
malwrar•3h ago
I wish journalists would explore why the technical methods & information sharing that enable this surveillance are allowed to exist. Highlighting instances of abuse and the quasi-legal nature of the industry doesn’t really get at the interesting part, which is _what motivates our leaders to allow surveillance in the first place_.

I recently completed Barack Obama’s A Promised Land (a partial account of his presidency), and he mentions in his book that although he wanted to reform mass surveillance, it looked a little different once he was actually responsible for people’s safety. I often think about this when I drive past Flock cameras or walk into grocery stores; our leaders seem more enticed by the power of this technology than they are afraid of vague abuses happening in _not here_. It seems like no one sees a cost to just not addressing the issue.

By analogy, I feel that reporting on the dangers of fire isn’t really as effective as reporting on why we don’t have arson laws and fire alarms and social norms that make our society more robust to abuse of a useful capability. People who like cooked food aren’t going to engage with anti-fire positions if they just talk about people occasionally burning each other alive. We need to know more about what can be done to protect the average person from downsides of fire, as well as who is responsible for regulating fire and what their agenda for addressing it is. I’d love to see an article identifying who is responsible for installing these Flock cameras in my area, why they did so, and how we can achieve the positive outcomes desired from them (e.g. find car thieves) without the negatives (profiling, stalking, tracking non-criminals, etc).

01HNNWZ0MV43FF•2h ago
It might be like prison reform and prisoners' rights - Nobody gets elected on a "soft on crime" platform, and civic engagement at the state and local level is so bad that people typically put up with cameras instead of agitating to get them banned. I say agitate. Show up, keep showing up, keep talking, keep telling friends. We can fight this. Democracy will work if we get people onboard, one way or another
3eb7988a1663•1h ago
You are more optimistic than I am. Flock and friends seem something like ChatControl. Those in power who want it have unlimited patience. They will keep pushing for expanded capabilities for the day when public attention has failed. Once they win, near impossible to revoke.
Gigachad•1h ago
I’m not totally opposed to surveillance, I just wish it was more transparent and limited to need to know uses.

If the police need your google search history thats ok as long as they can get a warrant showing they have justification and then perhaps at a delayed time, the account owner should be notified that this happened.

If they need access to your phone, rather than hacking it they should just take it off you and get the password from you.

This limits tracking since this is a fairly disruptive and visible thing and prevents just passive tracking of everyone all the time.

Businesses who use facial recognition for loss prevention should be legally required to only use their data for this purpose and never for marketing and analytics. They must not ever sell the data and delete it within a reasonable time.

martin-t•1h ago
What kind of crimes does surveillance prevent or help solve?

1) It does not _prevent_ the most serious crimes. People who are going to murder or rape someone are often not mentally capable or understanding how likely they are to get caught or caring about it in the moment. It might help solve it but there's usually more than enough conventional evidence. And these crimes are typically not what people coordinate with others so surveilling communication does not help much.

2) Stealing? Maybe. I can imagine cameras dissuade some opportunists but then again, shoplifting is reportedly high with self-checkouts and those are packed with cameras. Other kinds like burglars will probably just learn to be more careful with gloves and masks. And surveilling communication does not help unless we're talking organized crime and those people should be competent enough to use encrypted comms even if the major platforms are backdoored.

3) Crimes of opportunity like vandalism. Again, cameras are enough, if they work at all. The extra fraction of idiots who would be caught because they brag only about setting a trash can on fire it negligible compared to the downsides.

---

What surveillance absolutely could deter and help catch is organized resistance like staging a protest/riot/insurrection or individuals doing research before an assassination.

And that's why politicians, who are the most likely victims of these crimes, want surveillance. And you might genuinely believe that no current politician in your country deserves to be shot or that the current government should not be overthrown.

But we have to keep in mind that the next government will inherit these systems. Nothing is permanent, no democracy will last forever.

Historically, most countries have periods of freedom and authoritarianism, separated by collapse or revolt. At some point, in your country too, people will need to rise up to reassert their rights again.

It's a matter of when, not if.

---

I see where you are coming from and there were times in my life where more surveillance would have helped my side but ultimately, it's a balancing act and surveillance tips the scale in favor of people who already have a lot of power.

hammock•51m ago
Who says that the purpose of surveillance is to fight crime? Seems like you introduced a premise out of nothing.

(Downvote me for “being obtuse” but I’m pointing out unspoken assumption that’s worth considering)

Gigachad•44m ago
Semi regularly the police do stop terrorism plots before they happen. And just solving existing crimes is valuable itself. Especially for things like car crime, unless there was a video of it happening there is very little chance you’ll find the perpetrator.

Increasing the chance of criminals getting caught does a lot more for dissuading crime than increasing the penalties. Would you litter if you knew there was a 100% chance of getting a $50 fine?

It’s probably the case that politicians also don’t want to be the ones who blocked the data which would have lead to preventing a terrorist attack. And they get more visibility behind the scenes after taking the job.

martin-t•16m ago
Terrorism is barely an inconvenience. Just now in another top HN post, terrorism accounts for less than 0.001% of US deaths. That's percent so less than 1 in 100k. It essentially does not matter. It could increase tenfold and I'd be fine with it.

But the point I am trying to make is that surveillance does not work to stop the crimes people actually care about. Even if your biggest fear is terrorism, surveillance is not gonna stop somebody ramming their car into a crowd. Those who want to create fear have a myriad of ways which cannot be stopped without absolute, total surveillance, which makes any kind of resistance impossible.

I don't wanna live in a society where I have a 10% chance to get caught littering. Not because I wanna litter but because at some point, I might find myself homeless and needing to steal food to not starve. Or I might find myself living in a dictatorship and needing to drone the fucker who's sending my friends/family to a gulag.

Everything has a price. If the price of reducing common crime by 10% reduces the chance of a successful revolution by 20%, then it's not worth it. Because people are only free as long as they revoke their consent. If 50% of the population agree they live in a dictatorship, they should have a way to remove the government, whether by a ballot box or an ammo box.

armchairhacker•1h ago
Everyone thinks when they have power, they’ll use it correctly, because they have (from their perspective) good intentions.

An ideal government with total surveillance is the best case. You get the benefits of low crime without the drawback of corruption and ideology. The problem is in practice:

- Large institutions aren’t good at exercising fine control: even if the leaders have truly good intentions, corrupt mid-level employees and inaccurate data lead to bad outcomes.

- Good leaders seem to often pick bad successors, and unless they frequently pick better successors, someone will eventually pick a corrupt one.

- Corrupt leaders seem to be good at ousting or sidelining good leaders, more than vice versa, perhaps because good leaders are less passionate about gaining and keeping power.

Perhaps there are other reasons. Not just ideal governments, but even self-preserving governments don’t tend to last. Hence, although decentralization and privacy are never ideal, they should exist at least for backup, “just in case” (inevitably in practice) the centralized surveillance system goes rouge.

bombdailer•1h ago
There's a reason Plato's Republic looks authoritarian to people, because it models a city in which justice is the highest good, and justice and freedom are ultimately opposed to each other.

Since governments and laws exist to ensure justice, freedom will always be the price we pay.

potato3732842•1h ago
>governments and laws exist to ensure justice

Governments mostly exist to coordinate resource usage to out compete other societies.

Some amount of justice and welfare and roads, or whatever other things (varied by society and time period), are what they pay us so that our compliance is mostly voluntary and is therefore substantially more efficient.

You can bicker over exact word choice and the minute, but this general form is how it's always been from the present all the way back into the ancient world.

airstrike•1h ago
Governments exist to monopolize violence in the hands of a few so that we may have less violence and more order overall.
martin-t•1h ago
> Good leaders seem to often pick bad successors

This whole way of thinking makes my skin crawl.

Just like sex, any kind of power exchange needs consent.

This whole idea that people are led or need to be led is wrong. Perhaps some people do but that's their problem, it shouldn't be mine. What politicians are is decision makers, not leaders.

We don't have time to vote on every single law personally, so we appoint temporary assistants who do it for us, based on our preferences. That's how it should work.

These assistants should work for us, not lead us. We should always have the power to override their decisions and to remove and replace them at any time. Of course, making this work in a practical manner, while satisfying constraints such as secrecy of votes, is difficult. I don't dispute that but we should be striving to find ways to get as close to this ideal as possible, not making politics into a career or treating it as a reality show.

And most certainly, these assistants ("leaders" as you call them) should not be picking their successors without our consent.

CobrastanJorji•1h ago
Voting isn't necessarily a better system. The majority of people will very frequently give up rights in any given specific case that, in general, they hold dear. We're not rational actors.

And there are a lot of really weird discussions to be had about "consent," too. If we allow unlimited speech, that means that we're all subject to marketing and propaganda, and that's another thing that people are quite vulnerable to. Being convinced to vote via propaganda isn't really a great example of consent. But banning any speech that resembles propaganda is rife with problems.

Anyway, my point is that democracy/voting and free speech isn't necessarily the most free/consented-to form of government. I'm not sure what would take its place, though. I certainly wish I knew.

hammock•55m ago
Dunno where parent said anything about democracy. Democracy and voting aren’t the same thing also they rejected the idea of voting on every law (democracy).

It seems inherent in your worldview that you lack faith in people to self govern (that is, for a person to govern themselves. Which would explain why you are at odds with the parent. I suggest you read a bit of Jefferson’s ideas of self governance, education, etc. There are tradeoffs as with everything else, I do think based solely on your short commentary here that there may be an opportunity for your perspective to be enriched however

AnthonyMouse•1h ago
> And most certainly, these assistants ("leaders" as you call them) should not be picking their successors without our consent.

Whether they pick them or you pick them, you still have the same problem.

Bad people often get into office. Politicians lie, major parties both run bad candidates, sometimes voters are of the inclination to just elect whoever they think will mount the strongest assault on the status quo.

Expecting that never to happen is a lot less pragmatic than setting things up ahead of time to mitigate the damage when it does.

martin-t•58m ago
> sometimes voters are of the inclination to just elect whoever they think will mount the strongest assault on the status quo

This is absolutely a thing and it's a thing because at some point, people notice how little power they actually have.

Every person's opinion is a point in N-dimensional space.

Representative democracy is describing that point (expressing their political opinion) by picking 1 point out of a handful of pre-determined options (parties/representatives). Some countries only have 2 real choices.

That's absolutely insane, no wonder people feel like their vote doesn't matter, they often can't even find a choice remotely close to their real preferences.

potato3732842•55m ago
>Bad people often get into office.

The constraints of the office ought to account for that.

armchairhacker•26m ago
But the people in office need some power, enough to cause problems if they're bad. Otherwise you have the failures of no government: "might makes right", no coordinated projects, no defense, etc.; or another group (e.g. corporation) becomes the de-facto government.

Hence the root problem, that we haven't discovered a way to consistently have "good" government, whether it's a dictatorship or democracy. Perhaps with technology, we can invent a better form of government, e.g. a "super-democracy" where people vote on individual decisions (though even today I can imagine issues that would cause).

Until then, the key point I make is that you can have a government where some people ("leaders") do have more power than others, but not enough power for total control. The hopefully-realistic ideal is that the government has enough power to defend itself against an external threat always, and coordinate large projects when functioning well; but not too much so that, when functioning badly, essential internal systems are preserved, and when it's replaced (because as mentioned it will eventually collapse) the transition is minimally disruptive.

potato3732842•24m ago
>Otherwise you have the failures of no government: "might makes right", no coordinated projects, no defense, etc.; or another group (e.g. corporation) becomes the de-facto government.

We're pretty f-ing far from even having to think about those problems.

hammock•1h ago
Personally I would still call that leading/being led*, nonetheless that is a great reframe and I agree.

It also helps make the point of what it means to say “society is breaking down” or “democracy is at stake” or “faith in institutions in decline.” What it really means is that those whom were thought of as leaders no longer have the consent of the followers, who are making their own decisions now- often to ill effect of any strangers around them

*cf servant leadership as one particularly clear conceptualization

martin-t•1h ago
Because when you call them leaders and when they see themselves as leaders, they see themselves as a separate class. A permanent difference from the " mere citizen" class.

"Citizens will be on their best behavior because we are constantly recording and reporting everything that’s going on." -- Larry Ellison (who should not be anthropomorphized)

And Ellison is not even a politician, he doesn't even has any kind of immunity. Meanwhile, EU politicians want to impose Chat Control on everyone except them.

The core issue is that they see themselves as different from us.

Politics should not be a career. It should be something a person does for 5, at most 10 years max and after that they are back to being like everyone else, with 0 benefits (and with potentially more surveillance, I think politicians' finances should be under extra scrutiny for the rest of their lives).

themafia•1h ago
> it looked a little different once he was actually responsible for people’s safety.

That seems highly disingenuous or just ignorant. We publicly had this problem starting in the 1990s. The NSA used to have a program that would capture data but then encrypt it and protect it from random access. They discontinued that program and instituted a new one that had zero privacy protections in it.

This was right at the turn when the "war on terror" started. Which was the excuse then used to abandon the better program for the egregious one since it was projected to be better for this particular use case. It's debatable whether that was true or not.

> Flock cameras or walk into grocery stores

Record it if you want. Law enforcement, at any level, should require an actual warrant to access it in any form. This isn't a binary. You can enhance security and privacy at the same time.

potato3732842•1h ago
> It seems like no one sees a cost to just not addressing the issue.

It's the same "impose a small but poorly defined cost on everybody and act as though it's worth it because it maybe saves one defined life and therefore anyone who wants to call you out has an uphill battle" model you see used by bad people and dishonest comment section types the world over.

Society has no good way to reason about these "it's not much individually but when you do it to all of society it adds the F up" type downsides.

Like if you could save one life per year at the cost of making it take everyone an extra minute per day that's obviously not worth it at the scale of the united states because you're actually losing more life than you're saving.

But replace the "one minute" with something more subjective and nobody calls it out.

hammock•46m ago
You hit on it. The harms of surveillance is an externality, like air pollution. We think they are SELLING surveillance to us in the court of public opinion, but they aren’t. We aren’t the customers! They’re selling it to political donors, megaglobocorporate, a ruling class. And Joe Plumber is only consuming toxic byproducts
King-Aaron•1h ago
> I wish journalists would explore why the technical methods & information sharing that enable this surveillance are allowed to exist.

It boils down to one thing that allows these surveillance technologies to exist: public apathy.

hammock•49m ago
That’s tautology. Why are people apathetic about it?
AnthonyMouse•43m ago
> he mentions in his book that although he wanted to reform mass surveillance, it looked a little different once he was actually responsible for people’s safety.

This is a cowardly excuse. It's another way of saying that if you reform mass surveillance you'll be blamed for anything bad that subsequently happens, regardless of whether the mass surveillance would have prevented it. And bad things happen on a regular basis with or without mass surveillance, so then the politically risk-averse move is to not solve the problem you promised to solve and not expose yourself.

Which is cowardly specifically because the candidate's original position was correct. You can solve crimes without mass surveillance, or prevent them by reducing poverty etc. If you do those things then the chances of something bad happening go down instead of up.

And it will still not be zero -- it won't be zero no matter what you do -- but in that case you're only worried about adversarial pundits blaming you for things that weren't your fault, and adversarial pundits are going to do that regardless.

kklisura•3h ago
> This investigation began with an archive of data. [...] It contains 1.5 million records, more than 14,000 unique phone numbers, and people surveilled in over 160 countries.

Why not HIBP (Have I Been Pwned) style site to check against the database if your number is in?

hughw•2h ago
Right! I expected one.
Flockster•2h ago
I could not compare it completely, but it sounds very much like this talk that I saw many years ago at the CCC.

SS7: Locate. Track. Manipulate. [2014] https://media.ccc.de/v/31c3_-_6249_-_en_-_saal_1_-_201412271...

effdee•1h ago
Tobias Engel's initial video about this was "Locating Mobile Phones using SS7" given at the 25C3 in 2008:

https://media.ccc.de/v/25c3-2997-en-locating_mobile_phones_u...

alganet•2h ago
I think the world is not ready for the level of surveillance that exists in the wild.

For example, this post could have been a product of just probing a particular group of people to understand if they are interested in the subject and what they have to say about it.

That can be done indirectly, by suggesting someone (offering a link or planting an idea) that is already known to be interested in surveillance and prone to share interesting discoveries (in other words, the poster might not even be aware he could be an asset).

Think about the many ways someone could know your interests and how prone you are to react to something and how that could be used. If you are in tech, think about all the silly ways that kind of information can leak publicly.

People often disregard the possibility that they could be an active part of a surveillance network (as an unkowingly asset), instead focusing on more fantastical ideas such as technological hacks or coding wizardry.

EMM_386•2h ago
More on ALTAMIDES and system modules:

https://www.giosec.uk/specialist-services---geo-location.htm...

dogman144•2h ago
Reads like they’re doing one of several way to get mobile device IDs, and then x-ref those against anon’d adtech datasets that anchor on the mobile ID.

If your device privacy is a mess, mobile ID links you to all the good and bad things you do on a phone.

Had no idea this was part of the tool options, but backbone cell network makes sense.

Other TTPs I’d read about was variations on geo-fenced adserving to phish a mobile ID basically via user interaction or scroll past the ad. Small enough geofence and do it a few times, one could safely figure out the user being the ID. Googling “RTB surveillance” or “DSP surveillance” are ways into the topic.

Scary stuff! Pair that with this tech has been working for years, and is international. Frames a bit differently every action by a public figure - also at risk via the same threat model.

Also long have wondered what data analysis like this is done on technical forums… ran by a VC firm… with a lot of insider context (product market fit?) in the comments.

titzer•49m ago
Stallman was a firebrand and jerk, but he was right. When it comes to devices that have the potential to invade our privacy and make us easy targets for authoritarian governments, every last line of code and every transistor should be open.
sciencejerk•36m ago
SS7 telcom vulns still seem to be prevelant in 2025:

Femtocells and Fake Base Stations Attackers deploy femtocells — small cellular base stations — or fake base stations, commonly known as IMSI catchers, to intercept SS7 traffic. A modified femtocell can act as a man-in-the-middle, capturing signaling messages between a phone and the network.

Fake base stations mimic legitimate cell towers, tricking devices into connecting and relaying SS7 messages to the attacker’s system.

IMSI catchers exploit a known security vulnerability in the GSM specification, which requires the handset to authenticate to the network but does not require the network to authenticate to the handset. They broadcast a stronger signal than legitimate cell towers to lure mobile phones into connecting. Once connected, an IMSI catcher can force the transmission of the International Mobile Subscriber Identity (IMSI) and compel the connected mobile station to use no encryption or easily breakable encryption.

For 3G and LTE networks, sophisticated IMSI catcher attacks may involve downgrading the connection to less secure non-LTE network services to bypass enhanced security features. For example, a hacker might deploy a fake base station near a target to capture their IMSI and initiate SS7 queries.

https://www.how2lab.com/tech/mobile-communication/ss7-vulner...